Download Course Outline-Computer Security-Course Breakdown and more Lecture notes Computer Security in PDF only on Docsity! Title Credits Semester Duration Computer Network Security 3+0 18 Weeks Course Code: Semester: Class: CC420 Fall 10 BIT9 Instructor: Email: website: Office: Extension: A-307 2217 Counseling Hours: 1400-1500 hrs, Wednesday or by appointment Teaching Assistant: Email: website: Office: Extension: Pre-requisites: Students are expected to have taken following courses and topics: CE 320 Computer Networks Course Description: This course teaches the key concepts of computer and network security. The course is divided in two parts. The first part covers the key cryptology concepts and protocols while the second half is about the advance topics in network security. Although reasonable emphasis is laid down on programming, yet the mathematical part is heavily used in almost all the algorithms with proofs and theorems. Outcomes: After completion of the course, students are expected to have an in depth understanding of the advanced networking technologies that are employed by state-of-the-art secure networks. docsity.com Text Books: Reference Books: Network Security Essentials, Author: William Stallings. Publisher: Prentice Hall. Cryptography and Network Security, Author: William Stallings. Publisher: Prentice Hall. Applied Cryptography, 2nd Edition, Author: Bruce Schneier. Publisher: John Wiley & Sons. Tentative Grading Policy: OHTs : 30 % Quizzes : 10% Assignments & Lab : 5 % Term Project : 5 % Final Exam : 50 % Plagiarism Policy: No Plagiarism will be tolerated. Any attempt of copying code during the lab and assignment will result in a disciplinary action and zero marks in that lab/assignment to the students. Quizzes/Assignment Policy The quizzes will be a mix of announced and unannounced and the time allowed will be on the discretion of the instructor. In order to give practice and comprehensive understanding of subject, home assignments will be given, which will be scientific/term papers and programming assignments. The students are advised to do the assignment themselves. Copying of assignment is highly discouraged and taken as cheating case and will be forwarded for disciplinary action. Late assignments will not be accepted / graded. All assignments will count towards the total (No ‘best-of’ policy). Tools and Software: Platform independence for programming projects. Detailed Breakdown of Lecture (tentative) docsity.com